CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad

CVEReports
•1 minute ago•GHSA-5724-X3RH-5QQQ
7.6

CVE-2025-46349: Reflected Cross-Site Scripting in YesWiki File Upload

YesWiki versions prior to 4.5.4 contain multiple Reflected Cross-Site Scripting (XSS) vulnerabilities due to improper neutralization of user-supplied input. An unauthenticated attacker can execute arbitrary JavaScript in a victim's session by crafting a malicious URL containing a payload within the file parameter.

Amit Schendel
Amit Schendel
0 views•6 min read
•about 15 hours ago•CVE-2026-34605
8.6

CVE-2026-34605: Reflected Cross-Site Scripting via SVG Namespace Bypass in SiYuan

SiYuan personal knowledge management system versions 3.6.0 through 3.6.1 contain a high-severity Reflected Cross-Site Scripting (XSS) vulnerability. The flaw exists in the SVG sanitization logic within the `/api/icon/getDynamicIcon` endpoint, where an attacker can bypass tag blocklists using XML namespace prefixes. Successful exploitation allows unauthenticated attackers to execute arbitrary JavaScript in the context of the victim's session.

Alon Barad
Alon Barad
7 views•6 min read
•about 15 hours ago•CVE-2026-33578
4.3

CVE-2026-33578: Sender Policy Bypass via Incorrect Authorization in OpenClaw Extensions

OpenClaw versions prior to 2026.3.28 contain a vulnerability in the `googlechat` and `zalouser` extensions that allows unauthorized users to bypass sender policy restrictions. A logic error in policy resolution causes route-level group allowlists to silently downgrade to an "open" policy if no specific sender-level allowlist is configured.

Amit Schendel
Amit Schendel
6 views•6 min read
•about 16 hours ago•CVE-2026-32734
7.1

CVE-2026-32734: DOM-Based Cross-Site Scripting in baserCMS Tag Creation

baserCMS versions prior to 5.2.3 contain a DOM-based Cross-Site Scripting (XSS) vulnerability within the administrative dashboard's tag creation functionality. The vulnerability stems from the unsafe handling of JSON API responses using jQuery's `.html()` method, allowing attackers to execute arbitrary JavaScript in the context of an administrator's session.

Alon Barad
Alon Barad
6 views•7 min read
•about 16 hours ago•CVE-2026-21861
9.1

CVE-2026-21861: Authenticated OS Command Injection in baserCMS Core Update Feature

baserCMS versions prior to 5.2.3 are vulnerable to an authenticated OS Command Injection flaw in the core update mechanism. An attacker with administrator privileges can execute arbitrary system commands via the `php` POST parameter during the update process. The vulnerability stems from insecure direct concatenation of user-supplied input into the PHP `exec()` function without appropriate sanitization or escaping.

Alon Barad
Alon Barad
7 views•6 min read
•about 18 hours ago•GHSA-39MP-545Q-W789
5.4

GHSA-39MP-545Q-W789: Improper Authorization in OpenClaw /send Command

An authorization bypass vulnerability in the OpenClaw personal AI assistant ecosystem allows non-owner users with generic command permissions to persistently modify session-specific message delivery policies. By issuing the `/send` command, attackers can silence the agent or force unintended message delivery.

Amit Schendel
Amit Schendel
10 views•6 min read
•about 20 hours ago•CVE-2026-34377
8.4

CVE-2026-34377: Consensus Split Vulnerability in Zebra Transaction Verification Cache

A logic error in the Zebra transaction verification cache for Zcash V5 transactions leads to improper signature validation. By exploiting the discrepancy between the mined transaction ID and the full authorization root, a malicious miner can force vulnerable Zebra nodes to accept invalid blocks, resulting in a network consensus split.

Alon Barad
Alon Barad
3 views•6 min read
•about 21 hours ago•GHSA-955R-262C-33JC
9.4

CVE-2026-33634: Supply Chain Compromise and Malicious Code Execution in Telnyx Python SDK

The official Telnyx Python SDK (telnyx) on PyPI was compromised in a supply chain attack by the threat actor TeamPCP. Versions 4.87.1 and 4.87.2 contain embedded malicious code that executes upon import, utilizing WAV audio steganography to deploy secondary payloads for credential harvesting and persistence.

Alon Barad
Alon Barad
4 views•6 min read
•about 21 hours ago•CVE-2026-34385
6.2

CVE-2026-34385: Second-Order SQL Injection in Fleet Apple MDM Profile Delivery

Fleet open-source device management software prior to version 4.81.0 contains a second-order SQL injection vulnerability in its Apple MDM profile delivery pipeline. An attacker with a valid MDM enrollment certificate can exploit this flaw to execute arbitrary database modifications.

Alon Barad
Alon Barad
4 views•5 min read
•about 23 hours ago•CVE-2026-34386
6.3

CVE-2026-34386: Authenticated SQL Injection in Fleet MDM Bootstrap Package Configuration

Fleet open-source device management software prior to version 4.81.0 contains a SQL injection vulnerability in its MDM bootstrap package configuration module. Authenticated users with Team Admin or Global Admin privileges can execute arbitrary database queries when the Apple MDM feature is enabled.

Alon Barad
Alon Barad
3 views•6 min read
•1 day ago•CVE-2026-34388
6.6

CVE-2026-34388: Authenticated Denial of Service via Unhandled gRPC Log Type in Fleet Launcher

Fleet Device Management versions prior to 4.81.0 contain a Denial of Service (DoS) vulnerability in the gRPC launcher endpoint. An enrolled host can submit an unexpected log type value that triggers an unhandled Go panic, crashing the entire server process and disrupting all MDM operations.

Amit Schendel
Amit Schendel
6 views•8 min read
•1 day ago•CVE-2017-20229
9.8

CVE-2017-20229: Stack-Based Buffer Overflow in MAWK Interpreter

MAWK versions 1.3.3-17 and prior contain a critical stack-based buffer overflow vulnerability in the main argument parsing and stack management routines. This flaw allows an attacker to achieve arbitrary code execution by supplying excessively long command-line arguments, overwriting adjacent memory to hijack control flow via a Return-Oriented Programming (ROP) chain.

Amit Schendel
Amit Schendel
8 views•5 min read
SeverityExploitPeriodCatalog
Sort

Or generate a custom report

Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis

Automated vulnerability intelligence. 1,316+ reports.